A two-tier system for web attack detection using linear discriminant method

Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu, Wenjing Jia, Wei Chang Yeh

Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

Computational cost is one of the major concerns of the commercial Intrusion Detection Systems (IDSs). Although these systems are proven to be promising in detecting network attacks, they need to check all the signatures to identify a suspicious attack in the worst case. This is time consuming. This paper proposes an efficient two-tier IDS, which applies a statistical signature approach and a Linear Discriminant Method (LDM) for the detection of various Web-based attacks. The two-tier system converts high-dimensional feature space into a low-dimensional feature space. It is able to reduce the computational cost and integrates groups of signatures into an identical signature. The integration of signatures reduces the cost of attack identification. The final decision is made on the integrated low-dimensional feature space. Finally, the proposed two-tier system is evaluated using DARPA 1999 IDS dataset for webbased attack detection.

Original languageEnglish
Title of host publicationInformation and Communications Security - 12th International Conference, ICICS 2010, Proceedings
Pages459-471
Number of pages13
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event2010 International Conference on Information and Communications Security, ICICS 2010 - Barcelona, Spain
Duration: 15 Dec 201017 Dec 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6476 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2010 International Conference on Information and Communications Security, ICICS 2010
Country/TerritorySpain
CityBarcelona
Period15/12/1017/12/10

Keywords

  • Feature selection
  • Intrusion detection
  • Linear discriminant method
  • Packet payload
  • Web-based attack

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'A two-tier system for web attack detection using linear discriminant method'. Together they form a unique fingerprint.

Cite this